🐛 bug: don't leak request IDs in the audit log

main
_ 2021-07-11 10:56:40 +00:00
parent fb484018db
commit 429d1cc957
3 changed files with 0 additions and 3 deletions

View File

@ -138,7 +138,6 @@ async fn handle_http_request (
state.audit_log.push (AuditEvent::new (AuditData::WebClientGet { state.audit_log.push (AuditEvent::new (AuditData::WebClientGet {
user, user,
req_id: req_id.clone (),
server_name: server_name.to_string (), server_name: server_name.to_string (),
uri, uri,
})).await; })).await;

View File

@ -123,7 +123,6 @@ pub enum AuditData {
RelayStart, RelayStart,
WebClientGet { WebClientGet {
user: Option <String>, user: Option <String>,
req_id: String,
server_name: String, server_name: String,
uri: String, uri: String,
}, },

View File

@ -1,7 +1,6 @@
Interesting issues will get a unique ID with Interesting issues will get a unique ID with
`dd if=/dev/urandom bs=5 count=1 | base32` `dd if=/dev/urandom bs=5 count=1 | base32`
- Don't leak request ID in audit log
- Fix long-running downloads restarting in the middle - Fix long-running downloads restarting in the middle
- [DMX6CO4G](issues/2021-01Jan/status-DMX6CO4G.md) fire-and-forget logs / key-value status data - [DMX6CO4G](issues/2021-01Jan/status-DMX6CO4G.md) fire-and-forget logs / key-value status data
- ptth_tail - ptth_tail